An improved solution for managing use of a plurality of wireless devices is provided. In an embodiment of the invention, a usage policy is obtained for the plurality of wireless devices. usage data for one or more of the plurality of wireless devices is compared against the usage policy, wherefrom an exception report is derived and created. In another embodiment, the exception report is analyzed for non-compliance and a customer is notified.
|
19. A method of generating a system for managing use of a plurality of wireless devices owned by a customer, the method comprising:
providing a computer system operable to:
obtain at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following: restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
compare usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices;
create an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
present the exception report to a user.
10. A system for managing use of a plurality of wireless devices owned by a customer, the system for managing comprising:
a system for obtaining at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following: restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
a system for comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices
a system for creating an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
a system for presenting the exception report to a user.
1. A computerized method of managing use of a plurality of wireless devices owned by a customer, the method comprising:
using a computer system including at least one computer device to obtain at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following: restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
using the computer system to compare usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices;
using the computer system to create an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
using the computer system to present the exception report to a user.
18. A computer program comprising program code stored on a non-transitory computer-readable storage medium, which when executed, enables a computer system to implement a method of managing use of a plurality of wireless devices owned by a customer, the method comprising:
obtaining at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following: restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices;
creating an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
presenting the exception report to a user.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
using the computer system to obtain at least one usage policy for a credit card owned by the customer;
using the computer system to obtain credit card usage data for the credit card; and
using the computer system to compare the at least one usage policy for the credit card to the credit card usage data.
7. The method of
8. The method of
9. The method of
the plurality of wireless devices are supplied by a plurality of providers; or the
usage data is obtained from a plurality of providers.
11. The system for managing of
12. The system for managing of
13. The system for managing of
14. The system for managing of
a system for obtaining at least one usage policy for a credit card owned by the customer;
a system for obtaining credit card usage data for the credit card; and
a system for comparing the at least one usage policy for the credit card to the credit card usage data.
15. The system for managing of
16. The system for managing of
17. The system for managing of
the plurality of wireless devices are supplied by a plurality of providers; or
the usage data is obtained from a plurality of providers.
20. The method of
obtain at least one fraud pattern defining an exception, and
compare the at least one fraud pattern to the usage data.
21. The method of
obtain at least one usage policy for a credit card owned by the customer;
obtain credit card usage data for the credit card; and
compare the at least one usage policy for the credit card to the credit card usage data.
22. The method of
the plurality of wireless devices are supplied by a plurality of providers; or the
usage data is obtained from a plurality of providers.
|
Aspects of the invention relate generally to a method for managing wireless devices, and more particularly, to a solution for using exception monitoring in the management of wireless devices.
Usage of wireless devices such as a mobile phone, a smartphone, a personal digital assistant (PDA), etc. has exploded in recent time. Although this tremendous increase in use has effected the individual owner, there are additional complications created for a group, organization, and/or company that are using wireless devices. As the types, number, and usage of wireless devices continues to increase, it becomes critical for a company to better manage aspects of the wireless devices, such as the number and/or types of wireless devices, as well as to accurately track charges, such as monthly utilization, to actual cost. Companies also find a requirement to help ensure that costs/billing be applied to a particular division, department, and/or individual level. Other important issues include keeping and tracking available information on the asset(s), such as what manufacturer, model, and/or software is installed, and how the wireless device is configured. Wireless device users also require wireless device support, either live or self-help, for problem resolution. Software updates are another requirement, keeping the wireless device up-to-date with the latest fixes and/or enhancements.
An illustrative scenario is a corporation, XYZ Corp. (XYZ), which requires mobile phones and PDA devices for employees. As such, XYZ contracts both with a cellular service provider, CP1, and with CP2, a mobile phone and PDA device provider. Both CP1 and CP2 are to each provide services for corporate and personal employee usage of their respective wireless devices. This requires XYZ and/or the employees to contact each provider (i.e., CP1, CP2) for monthly usage, billing, support, etc. Certainly with any size company, but in particular with large companies, because of the vast quantities of wireless devices and the use thereof, and/or the globalization of a company, suitable and efficient management of the wireless devices has quickly become less attainable.
A consideration in managing wireless devices is unacceptable use of the wireless devices. Unacceptable uses may include, for example, fraud, misuse, overrun in cost usage, unauthorized calls, unauthorized use of Internet, and/or the like. Efficiently managing, monitoring, and/or controlling unacceptable use in wireless devices is compounded by multiple wireless devices, multiple wireless device providers, multiple third party wireless carrier providers and/or the complexity and structure of the company itself.
In view of the foregoing, a need exists to overcome one or more of the deficiencies in the related art.
Aspects of the invention provide an improved solution for managing use of a plurality of wireless devices. In an embodiment of the invention, a usage policy is obtained for the plurality of wireless devices. Usage data for one or more of the plurality of wireless devices is compared against the usage policy, wherefrom an exception report is derived and created. In another embodiment, the exception report is analyzed for non-compliance and a customer is notified.
A first aspect of the invention provides a method of managing use of a plurality of wireless devices, the method comprising: obtaining at least one usage policy for the plurality of wireless devices; comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and creating an exception report, derived from the comparing.
A second aspect of the invention provides a system for managing use of a plurality of wireless devices, the system comprising: a system for obtaining at least one usage policy for the plurality of wireless devices; a system for comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and a system for creating an exception report, derived from the comparing.
A third aspect of the invention provides a computer program comprising program code stored on a computer-readable medium, which when executed, enables a computer system to implement a method of managing use of a plurality of wireless devices, the method comprising: obtaining at least one usage policy for the plurality of wireless devices; comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and creating an exception report, derived from the comparing.
A fourth aspect of the invention provides a method of generating a system for managing use of a plurality of wireless devices, the method comprising: providing a computer system operable to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
A fifth aspect of the invention provides a data processing system for managing use of a plurality of wireless devices, comprising: a processing unit; a bus coupled to the processing unit; and a memory medium coupled to the bus comprising program code, which when executed by the processing unit causes the data processing system to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
A sixth aspect of the invention provides computer software embodied in at least one propagated signal for managing use of a plurality of wireless devices, the at least one propagated signal comprising instructions for causing at least computer system to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
A seventh aspect of the invention provides a business method for managing use of a plurality of wireless devices, the business method comprising managing a network that includes at least one computer system that performs the process described herein; and receiving payment based on the managing.
The illustrative aspects of the invention are designed to solve one or more of the problems herein described and/or one or more other problems not discussed.
These and other features of the invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings that depict various embodiments of the invention, in which:
It is noted that the drawings are not to scale. The drawings are intended to depict only typical aspects of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements between the drawings.
As indicated above, aspects of the invention provide an improved solution for managing wireless devices including the use of exception monitoring. In an embodiment of the invention, usage policies are obtained from, for example, the customer. These usage policies are then compared to a wireless device usage data, whereby an exception report is derived. In another embodiment, the exception report is analyzed for non-compliance and the customer is notified. As used herein, unless otherwise noted, the term “set” means one or more (i.e., at least one) and the phrase “any solution” means any now known or later developed solution.
Turning to the drawings,
Computing device 14 is shown including a processor 20, a memory 22A, an input/output (I/O) interface 24, and a bus 26. Further, computing device 14 is shown in communication with an external I/O device/resource 28 and a storage device 22B. In general, processor 20 executes program code, such as exception monitoring program 30, which is stored in a storage system, such as memory 22A and/or storage device 22B. While executing program code, processor 20 can read and/or write data, such as usage policy 50, fraud patterns 52, exception report 54, and/or the like to/from memory 22A, storage device 22B, and/or I/O interface 24. Bus 26 provides a communications link between each of the components in computing device 14. I/O device 28 can comprise any device that transfers information between a user 16 and computing device 14. To this extent, I/O device 28 can comprise a user I/O device to enable an individual user 16 to interact with computing device 14 and/or a communications device to enable a system user, such as a wireless device 18, to communicate with computing device 14 using any type of communications link.
In any event, computing device 14 can comprise any general purpose computing article of manufacture capable of executing program code installed thereon. However, it is understood that computing device 14 and exception monitoring program 30 are only representative of various possible equivalent computing devices that may perform the process described herein. To this extent, in other embodiments, the functionality provided by computing device 14 and exception monitoring program 30 can be implemented by a computing article of manufacture that includes any combination of general and/or specific purpose hardware and/or program code. In each embodiment, the program code and hardware can be created using standard programming and engineering techniques, respectively.
Similarly, computer system 12 is only illustrative of various types of computer systems for implementing aspects of the invention. For example, in one embodiment, computer system 12 comprises two or more computing devices that communicate over any type of communications link, such as a network, a shared memory, or the like, to perform the process described herein. Further, while performing the process described herein, one or more computing devices in computer system 12 can communicate with one or more other computing devices external to computer system 12 using any type of communications link. In either case, the communications link can comprise any combination of various types of wired and/or wireless links; comprise any combination of one or more types of networks; and/or utilize any combination of various types of transmission techniques and protocols.
As discussed herein, exception monitoring program 30 enables computer system 12 to manage a plurality of wireless devices 18 over a network. To this extent, exception monitoring program 30 is shown including an obtaining module 32, a comparison module 34, a reporting module 36, an analyzing module 38, and a notification module 40. Operation of each of these modules is discussed further herein. However, it is understood that some of the various modules shown in
Regardless, aspects of the invention provide a solution for managing wireless devices 18 over a network. The network can comprise any combination of public and/or private networks. In an embodiment of the invention, the network comprises a peer-to-peer (P2P) network. The P2P network can comprise a private network and/or can comprise a public network, such as the Internet. In any event, computer system 12 can comprise a peer in the P2P network and can share with other peers (not shown) on the P2P network. Additionally, computer system 12 can obtain shared content from one or more of the peers. It is understood that each peer can be configured similar to computer system 12. The configuration of peers has not been shown for clarity.
Usage policy 50, fraud patterns 52, exception report 54, and/or usage data 56 (e.g., content) can comprise any type of electronic data. For example, usage policy 50 can comprise a single data file that includes electronic data stored in any compressed or uncompressed format. However, it is understood that usage policy 50 can be embodied in any number of data files and/or other storage solutions. Fraud patterns 52, exception reports 54, and usage data 56 have similar possible compositions and configurations. Usage policy 50, fraud patterns 52, exception reports 54 and/or usage data 56 can be shared between peers and/or user 16 using any solution. For example, in a P2P network, computer system 12 can communicate/receive all of content 50, 52, 54, 56 to/from a single peer or user 16 or can communicate/receive only a portion of content 50, 52, 54, 56 to/from peer or user 16 while one or more other peers and/or user 16 provide other portion(s) of content 50, 52, 54, 56. Further, usage policy 50, fraud patterns 52, exception reports 54, and/or usage data 56 may be provided by a customer and/or a third party.
Aspects of the invention provide an improved solution for managing wireless devices 18 for a customer. To this extent,
The usage policy 50 is virtually limitless in its scope and scale. For example, perhaps a certain commercial competitor, Acme Inc., is an unacceptable communicant with the customer's wireless device 18 users. Acme may, for example, be purchased by the instant company that is employing methods herein. In such a case, the policy 50 may change so that future wireless device 18 communications to and/or from an Acme employee are allowable.
In any event, in S2, at least one aspect of the usage policy 50 is compared with wireless device 18 usage data 56 using comparison module 34 (
In S3, an exception report 54 is created by reporting module 36 (
In an embodiment, the method additionally comprises S4, wherein analyzing module 38 (
Additionally, the method may comprise S5, wherein the customer is notified, via notification module 40 (
In another embodiment, additional use of captured fraud patterns 52 may be employed. Each fraud pattern 52 can define an exception (e.g., non-compliance with usage policy 50). Fraud patterns 52 may include data on various past activity either derived “in-house” (e.g., from past exception reports 54) and/or obtained from outside, third parties and/or from a customer. For example, service provider(s), wireless device providers, law enforcement entities, and/or the like may provide data suitable for more readily ascertaining unacceptable wireless device 18 use. Fraud patterns 52 need not necessarily be legally fraudulent activity and therefore the use of the term “fraud” is not meant to be limiting.
In any event, if a fraud pattern 52 is employed, the method may further comprise the comparison module 34 further comparing fraud patterns 52 to the wireless device 18 usage data 56 discussed herein. In this manner, the comparison of fraud patterns 52 and/or usage policy 50 against wireless device 18 usage data 56 produces a robust exception report 54.
In still another embodiment of the invention, the additional monitoring of a set of credit cards 60 (
While shown and described herein as a method and system for managing wireless devices 18 for a customer, it is understood that the invention further provides various alternative embodiments. For example, in one embodiment, the invention provides a computer program stored on a computer-readable medium, which when executed, enables a computer system to manage wireless devices 18 for a customer. To this extent, the computer-readable medium includes program code, such as exception monitoring program 30 (
In another embodiment, the invention provides a method of generating a system for managing wireless devices 18 for a customer. In this case, a computer system, such as computer system 12 (
In still another embodiment, the invention provides a business method that manages wireless devices 18 for a customer, which enables users to perform the process described herein on a subscription, advertising, and/or fee basis. That is, a service provider could offer to manage a network and/or a computer system 12 (
As used herein, it is understood that “program code” means any set of statements or instructions, in any language, code or notation, that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression. To this extent, program code can be embodied as any combination of one or more types of computer programs, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing, storage and/or I/O device, and the like.
The foregoing description of various aspects of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible. Such modifications and variations that may be apparent to an individual in the art are included within the scope of the invention as defined by the accompanying claims.
Richards, Jr., Patrick J., Johnson, Randy S., Northway, Tedrick N., Brink, Jr., Kenneth A., Malkowski, Raymond T., Martin, Jeffrey H., Winkler, Duane L.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
6256515, | Apr 29 1998 | GRAPE TECHNOLOGY GROUP, INC | Call management system for wireless telephones |
6308053, | Oct 21 1997 | RPX Corporation | Recyclable wireless telephone unit with a secured activation switch |
6308067, | Nov 30 1999 | AT&T MOBILITY II LLC | Wireless communications system and method of operation for reducing fraud |
6687496, | Aug 02 2000 | BEIJING XIAOMI MOBILE SOFTWARE CO , LTD | Memory programming method and system |
6847970, | Sep 11 2002 | International Business Machines Corporation | Methods and apparatus for managing dependencies in distributed systems |
6920319, | May 05 2000 | AXIS AB | Method and apparatus for a mobile access system delivering location based information and services |
7010002, | Jun 14 2001 | AT&T Corp | Broadband network with enterprise wireless communication method for residential and business environment |
20010044325, | |||
20020081995, | |||
20020154751, | |||
20040063463, | |||
20040067747, | |||
20050041648, | |||
20050054324, | |||
20060031399, | |||
20060223495, | |||
20080319808, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 05 2007 | BRINK, KENNETH A , JR | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019201 | /0499 | |
Apr 05 2007 | JOHNSON, RANDY S | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019201 | /0499 | |
Apr 05 2007 | MALKOWSKI, RAYMOND T | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019201 | /0499 | |
Apr 05 2007 | MARTIN, JEFFREY H | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019201 | /0499 | |
Apr 05 2007 | NORTHWAY, TEDRICK N | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019201 | /0499 | |
Apr 05 2007 | RICHARDS, PATRICK J , JR | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019201 | /0499 | |
Apr 05 2007 | WINKLER, DUANE L | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019201 | /0499 | |
Apr 11 2007 | International Business Machines Corporation | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jun 10 2016 | REM: Maintenance Fee Reminder Mailed. |
Oct 30 2016 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Oct 30 2015 | 4 years fee payment window open |
Apr 30 2016 | 6 months grace period start (w surcharge) |
Oct 30 2016 | patent expiry (for year 4) |
Oct 30 2018 | 2 years to revive unintentionally abandoned end. (for year 4) |
Oct 30 2019 | 8 years fee payment window open |
Apr 30 2020 | 6 months grace period start (w surcharge) |
Oct 30 2020 | patent expiry (for year 8) |
Oct 30 2022 | 2 years to revive unintentionally abandoned end. (for year 8) |
Oct 30 2023 | 12 years fee payment window open |
Apr 30 2024 | 6 months grace period start (w surcharge) |
Oct 30 2024 | patent expiry (for year 12) |
Oct 30 2026 | 2 years to revive unintentionally abandoned end. (for year 12) |